CyberSecurity updates
Updated: 2024-10-22 03:24:38 Pacfic


Microsoft Threat Intelligence @ Microsoft Security Blog
New macOS Vulnerability, "HM Surf", Allows Attackers to Bypass Transparency, Consent, and Control (TCC) Protection - 4d

Microsoft Threat Intelligence has discovered a new macOS vulnerability, dubbed “HM Surf”, that allows attackers to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to protected user data. The vulnerability involves removing TCC protection for the Safari browser directory and modifying a configuration file to access user data, including browsing history, camera, microphone, and location, without user consent. Microsoft has reported the vulnerability to Apple, which has released a fix as part of a macOS security update. Users are urged to install the update as soon as possible to mitigate the risk. This vulnerability highlights the importance of keeping operating systems and applications updated to protect against emerging threats and the persistent challenges of maintaining robust security in complex software environments.

cyble.com
Veeam Backup & Replication Vulnerability (CVE-2024-40711) Actively Exploited By Ransomware Groups - 6d

A critical vulnerability (CVE-2024-40711) has been discovered in Veeam Backup & Replication, enabling attackers to execute arbitrary code remotely without authentication. This flaw has been exploited by Akira and Fog ransomware groups, potentially leading to data breaches and system takeovers. The vulnerability affects various Veeam products, including Veeam Backup & Replication, Veeam ONE, and Veeam Agent for Linux, among others. Organizations should prioritize patching affected systems to mitigate the risk of exploitation.

MalBot @ Malware Analysis, News and Indicators
Falco Runtime Security for Distributed Architectures - 5d

Falco, an open-source runtime security project, is designed for secure and efficient operation in distributed architectures. Falco’s plugin-based architecture allows organizations to tailor it to their needs and extend its capabilities beyond traditional endpoint-focused security tools. Its ability to observe and enforce security policies across a variety of services and applications makes it suitable for modern cloud-native environments. Falco’s custom rules enable developers and security teams to define what constitutes a real threat, providing a level of specificity and confidence that generic detection tools cannot match. Falco is a robust solution for security in cloud and container environments, providing a more comprehensive and proactive approach.

ciso2ciso.com
Critical Vulnerability in Ivanti Cloud Service Appliance Actively Exploited - 6d

A critical vulnerability in Ivanti’s Cloud Service Appliance (CSA) has been actively exploited by attackers. The flaw, tracked as CVE-2024-8190, allows attackers to gain unauthorized access to sensitive data and execute arbitrary commands on vulnerable systems. The vulnerability exists in the CSA’s authentication mechanism and can be exploited by attackers who can send specially crafted requests to the CSA. This attack vector allows attackers to bypass the CSA’s security measures and gain access to the underlying operating system. The vulnerability has been exploited in the wild by a suspected nation-state adversary. There are strong indications that China is behind the attacks. Organizations using Ivanti CSA should prioritize patching the vulnerability immediately to reduce their risk of being compromised.

Panda Security @ Panda Security Mediacenter
Robot Vacuum Cleaners Hacked for Spying and Insults - 7d

Multiple robot vacuum cleaners in the US have been hacked, allowing attackers to control the devices remotely, access live camera feeds, and even use the onboard speakers to yell obscenities and insults. The Ecovacs Deebot X2 robot vacuum cleaner, known for its live camera feed and remote control features, has been targeted. The incidents highlight the vulnerability of smart home devices to cyberattacks, emphasizing the importance of robust security measures and regular updates. Ecovacs has promised to issue a security upgrade in November.

Christian Vasquez @ CyberScoop
Unsecured Medical Devices Exposed Online - 8d

Cybersecurity researchers have discovered thousands of medical devices, login portals, and sensitive health records exposed online and vulnerable to attacks. This alarming trend highlights the significant risks associated with the increasing interconnectedness of medical devices and healthcare systems. Inadequate security measures and a lack of awareness about cybersecurity best practices are contributing factors. Urgent steps are needed to secure these critical systems and protect patient data.

msrc.microsoft.com
Microsoft Releases Critical Patch Tuesday Updates Addressing Exploited Vulnerabilities - 12d

Microsoft has released its October 2024 Patch Tuesday updates, addressing a total of 117 vulnerabilities across its ecosystem. This includes three critical vulnerabilities, two of which have been actively exploited in the wild, highlighting the importance of prompt patching to mitigate these risks. The first actively exploited vulnerability, CVE-2024-43572, is a remote code execution vulnerability in the Microsoft Management Console (MMC). It allows attackers to execute arbitrary code on a targeted system by tricking users into loading a malicious MMC snap-in. The second actively exploited vulnerability, CVE-2024-43573, is a platform spoofing vulnerability in Windows MSHTML. This vulnerability allows attackers to disguise themselves as trusted sources, potentially gaining unauthorized access to systems or data. The third critical vulnerability, CVE-2024-43468, is a remote code execution vulnerability in Microsoft Configuration Manager, which could allow attackers to execute commands on the targeted server or database without user interaction. The release also includes other critical vulnerabilities affecting various Microsoft products, including .NET, OpenSSH for Windows, Power BI, and Windows Hyper-V. Organizations are strongly advised to prioritize the installation of these security updates to protect their systems from potential attacks.


This site is an experimental news aggregator using feeds I personally follow. You can reach me using contacts documented at my website here (https://royans.net/) if you have feedback. You can also find Flathis at Mastodon.